Page 10 of 53 results (0.420 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

VMware before 4.5.2.8848-r5 searches for gdk-pixbuf shared libraries using a path that includes the rrdharan world-writable temporary directory, which allows local users to execute arbitrary code. • http://security.gentoo.org/glsa/glsa-200502-18.xml •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Format string vulnerability in VMware Workstation 4.5.2 build-8848, if running with elevated privileges, might allow local users to execute arbitrary code via format string specifiers in command line arguments. NOTE: it is not clear if there are any default or typical circumstances under which VMware would be running with privileges beyond those already available to the attackers, so this might not be a vulnerability. • http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1320.html http://www.osvdb.org/12169 http://www.securityfocus.com/bid/11737 https://exchange.xforce.ibmcloud.com/vulnerabilities/18297 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

VMware Workstation 4.0.1 for Linux, build 5289 and earlier, allows local users to delete arbitrary files via a symlink attack. • http://marc.info/?l=bugtraq&m=106029217115023&w=2 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1106 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

VMware GSX Server 2.5.1 build 4968 and earlier, and Workstation 4.0 and earlier, allows local users to gain root privileges via certain enivronment variables that are used when launching a virtual machine session. VMware GSX Server 2.5.1 compilación 4968 y anteriores, y Workstation 4.0 y anteriores, permite a usuarios locales ganar privilegios de root mediante ciertas variables de entorno que son usadas cuando se lanza una sesión de máquina virtual. • http://marc.info/?l=bugtraq&m=105899875225268&w=2 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1039 •

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 0

VMware Workstation 4.0 for Linux allows local users to overwrite arbitrary files and gain privileges via "symlink manipulation." VMware Workstation 4.0 para Linux permite a usuarios locales sobreescribir ficheros arbitrarios y ganar privilegios mediante una manipulación de enlaces simbólicos. • http://marc.info/?l=bugtraq&m=105673688529147&w=2 http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1019 •